Reed Elsevier

Displaying 1-40 of 907 results

  • White Papers // Sep 2014

    Using Quantum Key Distribution for Cryptographic Purposes: Asurvey

    "The appealing feature of Quantum Key Distribution (QKD), from a cryptographic viewpoint, is the ability to prove the Information-Theoretic Security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks Using AODV Protocol

    "MANETs are susceptible to various attacks. Out of which Denial of Service (DoS) are most dangerous and very difficult to detect and defend. Jellyfish is a new DoS attack categorized as JF reorder attack, JF periodic dropping attack and JF Delay variance attack. In JF delay variance attack, a JF...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Template-Based Human Detection and Feature-Based Tracking

    "Automatic video surveillance is seeing widespread use in the remote monitoring of people. When the authors are dealing with automatic video surveillance, classification of detected objects and tracking them are the most crucial processes. This paper proposes a human tracking system for static background, which first classifies all incoming objects...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Approaches to Parallelization of NLP Tasks in a Search System

    "The large web expanding every moment poses at least three important challenges - scale (processing of enormous amounts of data), processing speed, and relevance (ability to extract relevant information). Research in information extraction and search systems strive to handle one or more of these challenges. A key element in all...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Framework for Evaluating Web Service Based on Threat Patterns

    "The authors present a new methodology for web service to address the security issues and proposed a new computation technique which optimizes complex problem into smaller sub problems that can be solved more efficiently. In this paper, they present a study on vulnerability scanners to detect security vulnerabilities in publicly...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Adopting Dendritic Cell Algorithm to Conform a Hybrid Intrusion Detection System

    Artificial Immune System (AIS) is applied to hybrid Intrusion Detection System (IDS). A hybrid IDS is inspired by the concept of danger theory of human immune system is proposed in this paper and works for both host as well as network. The idea behind this hybrid IDS is based on...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Comprehensive Analysis of Requirement Engineering Approaches in a Data Warehouse Environment

    "Data warehouses contain vast amount of data generated from different sources. In order to maintain data in the data warehouse according to the organization some designing approaches are important. In data warehouse systems, Requirement Engineering (RE) is a crucial part of the software development process. Requirement engineering is a sub...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Dynamic Clustering to Detect Malicious Nodes in Wireless Sensor Network

    "Wireless sensor networks are vulnerable to many types of attacks that disturb the normal behavior of the network. These attacks occur because of the presence of malicious nodes in the network that advertise false information among the nodes and disrupt normal operations of the network. This paper proposes a mechanism...

    Provided By Reed Elsevier

  • White Papers // Jan 2014

    Video Surveillance System for Security Applications

    "Computer Vision (CV), or image understanding, seeks to replace human interpretation with computer-based interpretation. Computer Vision deals with the automatic analysis, reconstruction, and recognition of objects in a scene from one or more images. Basically a video surveillance system deals with detection of unusual motion. The efficiency of video surveillance...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Security Solution to Protect SCADA Systems from Cyber Attacks

    "Supervisory Control And Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc, which happen to be part of critical infrastructure. Existing SCADA systems were originally designed for reliability. Initial SCADA systems used proprietary protocols like Modbus, DNP3 to access sensed data and initiate supervisory...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Cryptanalysis of a Chaotic Neural Network Based Chaotic Cipher

    "The rapid development of multimedia and network technology has promoted the use of digital images and videos being transmitted over internet and wireless network more and more frequently. So the security of digital images and videos is needed in many applications. Recently a triple key encryption method based on logistic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Congestion Control for Computer Networks Using Weighted Random Early Detection (WRED)

    "Computer network is a set of computers and hardware components linked together to communicate with each other. Congestion in networks occurs when at any node there is more data traffic than the outgoing link capacity. Effects of congestion are packet delay, packet drop, reduced system throughput and degraded quality of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Object Oriented Approach to Anatomy of Intrusion Detection System

    "Now-a-days intrusions become more increased in individual systems, so activities in a system must be observed by scanning and it must be saved for future use. If any discrepancy is found from observed behavior then a report must be generated to help red teams. The central idea of the authors'...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    End-to-End QoS Mapping Between UMTS and WiMAX in Loose Coupling Heterogeneous Wireless Network

    "One of the main objectives of Heterogeneous Wireless Access Networks (HWANs) is to integrate the different wireless access technologies, such as UMTS, WiMAX and WLAN, with a common IP-based network in order to offer mobile users continuous and unified service in a transparent way. However, one of the major issues...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Secure Authentication Key Agreement Protocol for Long Term Evolution - Advanced

    "The Authentication and Key Agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    TCP-P: A New Approach in Wireless Environment to Solve Issues Currently TCP Facing

    "TCP is a reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the bit error rate is really low and the authors assume that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from some significant issues like...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Impact of MAC Protocol Over the Performance of Routing Protocol in MANET

    "MANET is an unstructured network formed dynamically between a set of mobile nodes. Routing is a challenge for this network due to its dynamic topology as well as resource constraints. Many routing and MAC layer protocols have been proposed in the network history and most of the researches are under...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Enhanced Security Framework for Cloud Computing

    "Cloud computing provides large scale pool of resources, wide access, dynamicity, cost effective solution for storage. Public, private and hybrid deployment models exist for cloud computing along with various service models like integration as service, database as service, and security as service. Though cloud computing is being adopted as the...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Augmenting Naïve Bayes Classifier With Domain Knowledge in Detecting Malware

    "Malicious software attacks on the Internet are on the rise in both frequency and sophistication. The use of Naïve Bayes technique has been shown to be capable to detect malware. This paper proposes the usage of domain knowledge in the algorithm to improve detection accuracy. The domain knowledge consists of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Optimized

    "A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes in which different routing protocols are used to form the communication network. So, far there are numerous routing protocols are discovered in which AODV performs superior than all. Ad-hoc network suffer from the bunch of issues in which...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Mobile Ad Hoc Network Research Areas : A Step Ahead

    "A Mobile Ad-hoc NETworks (MANETs) is a collection of mobile nodes that dynamically self organize in a wireless network without using any preexisting infrastructure. In a MANET, the applications are typically ""Peer-to-peer"" rather than ""Client-server"". In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Stability History Based Route Selection Using K-Means Clustering in Mobile Adhoc Networks

    "In Mobile Ad-hoc NETworks (MANETs) there is no fixed communication infrastructure, so it allows more flexible model of communication than traditional networks. For any active connection in such a networks, the end hosts as well as the intermediate nodes, which relay the information, can be mobile. Because of this dynamic...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Reduction Fuzzy Data Set Based on Rough Accuracy Measure

    "Attribute reduction is very important in rough set because it used to simplify the induced decision rules without reducing the classification accuracy. In rough set theory, a reduct is generally defined as a minimal subset of attributes that can classify the same domain of objects as unambiguously as the original...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Comprehensive Study of Requirements for Network Applications and Routing Protocols Providing Resources in Vehicular AD HOC Networks

    "Vehicular ad hoc networks are special form of mobile ad hoc networks which have more dynamic topology than MANETs but the nodes move in a preordered fashion. Due to the high mobility and complex dynamics in real vehicular traffic flow, reliable streaming of data over vehicular ad hoc networks is...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Prediction of Peak Ground Acceleration (PGA) Using Artificial Neural Networks

    "In this paper, the probable range of the horizontal component of Peak Ground Acceleration (PGA) is predicted as a function of focal depth, earthquake magnitude and epicentral distance, using Artificial Neural Network (ANN). Three different ANN architectures (namely feed forward, back propagation and radial bias networks) are used to develop...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Mobile Embedded System for Advanced Weather Forecasting in Rural Area

    "City wise weather office is used for generating daily weather reports in present days. They study and report weather conditions from satellite images. But in reality, condition of weather keeps changing continuously, and, it takes time for these satellites to report the instant changes of weather. Thereby, most recent updates...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Application of Hybrid ACL Approach in Cloud Environment

    "Cloud computing is a revolutionary way of representation of services to its end users. Main characteristic of cloud environment is a separation between data owner and data user. Due to this separation, data owner is totally unaware about the status of its data plus total number of access performed on...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Trust Evaluation for Detecting Black Hole Attack on AODV Routing Protocol by Using Back Propagation Algorithm of Neural Network

    "A MANET consists of autonomous mobile nodes that are free to roam arbitrarily with no centralized controller such as a router to determine the communication paths. Each node in the ad hoc network has to rely on each other in order to forward packets. This kind of nature of MANET...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Efficient Approach of Multimedia Transcoding for Streaming Over Mobile Devices

    "The proposed system introduces a novel framework that can optimize the bandwidth and maintain better visual qualities by performing transcoding on the multimedia contents mainly targeted over the mobile devices. The system designed in Matlab considers both image and video as input file and performs multimedia transcoding considering BMP, GIFF,...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Traffic Based QoS Specific Adaptive Buffer Allocation in WiMAX Networks

    "Buffer allocation in WiMAX maximizes the throughput by achieving high link utilization of system and minimizes the power consumption. In this paper, traffic based QoS specific adaptive buffer allocation in WiMAX networks is proposed to increase the system throughput by using an adaptive buffer allocation strategy. The buffer management block...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    "Emotion Recognition Using DWT, KL Transform and Neural Network"

    "Human face communicates important information about a person's emotional condition. In this paper, an approach for facial expression recognition using wavelet transform for feature extraction and neural network classifier for five basic emotions is proposed. The strength of the algorithm is the reduction in feature size and use of less...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Efficient Hybrid Approach for Opportunistic Networks

    "Opportunistic network is next generation network of MANET. In opportunistic networks, route between mobile nodes never exits, mobile nodes communicate with each other once they notice chance to speak. Furthermore, nodes aren't alleged to possess or acquire any data regarding the constellation. Routes are engineered dynamically, whereas messages are route...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Block Cipher for Multimedia Encryption Using Chaotic Maps for Key Generation

    "In the digital world today, the multimedia security becomes more important. Digital services such as Pay-TV, video conferencing, medical imaging systems, have need of consistent security in storage and communication of multimedia data. It is difficult to use the conventional algorithms such as DES and AES, directly in multimedia data,...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Geo-Gossip: A Gossip Based Geographical Routing Protocol for Mobile Ad Hoc Networks

    "Existing ad hoc routing protocols induce large number of control packets while trying to discover the present location of a destination node in the network. Geographical ad hoc routing protocols reduce control packet overhead using past information about the destination node such as location, velocity and direction of motion during...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Comprehensive Security Scheme on MANETs

    "A Mobile Ad-hoc NETwork (MANET) is a self-organizing, infrastructure-less, multi-hop network. Security is a major issue in such networks. In this paper, a simple encryption scheme that uses masking has been proposed to secure these types of network. Message is encrypted with the key, which is generated using the contents...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Design of Advanced Intrusion Detection System

    "Advancements in network and communication technology are rapidly growing the data on internet. Even it brings today everyone on internet for individual's task. To do so, all businesses, government agencies, educational organizations, industries have setup their own networks and have connection with this rapid growing world. But in the sense...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    "A New Approach of Intrusion Detection System Using Clustering, Classification and Decision Table"

    "Intrusion Detection System (IDS) plays an important role to achieve higher security in finding or detecting malicious activities over network based as well as host based system for a couple of years. There are different types of intrusion detection system and anomaly intrusion detection is one of them. Currently this...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Classification and Analysis on Routing Nodes in MANET Using Fuzzy Proximity Relation With Ordering and Formal Concept Analysis

    "Routing information plays a vital role in Mobile Ad-hoc NETwork (MANET). In MANET, each node maintains routing information that assists the routing process. Routing nodes and their routing attributes are essential in determining the performance of MANET. Thus, it is necessary to obtain knowledge on routing nodes and their attributes....

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Multilevel Cryptography Scheduler

    "Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator cards. However, until now no operating system provided a mechanism that allowed both uniform and efficient use of this new type of resource. The authors have implemented the operating...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Trust Assessment Policy Manager in Cloud Computing

    "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Computing resources include networks, servers, storage, applications, and services. Cloud providers find adequate and accurate solutions to address the data privacy and security specifications of their business model. This paper proposes...

    Provided By Reed Elsevier

  • White Papers // Nov 2009

    Survey on Anonymous Communications in Computer Networks

    Anonymous communications aim to preserve communications privacy within the shared public network environment. It can provide security well beyond content privacy and integrity. The scientific studies of anonymous communications are largely originated from Chaum's two seminal approaches: mixnet and DC-net. In this paper, the authors present an overview of the...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    An Overview of Channel Assignment Methods for Multi-Radio Multi-Channel Wireless Mesh Networks

    Channel Assignment (CA) is an active research area due to the proliferating deployments of multi-radio multi-channel wireless mesh networks. This paper presents an in-depth survey of some of the CA approaches in the literature. First, the key design issues for these approaches are identified, laying down the basis for discussion....

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    GeoCross: A Geographic Routing Protocol in the Presence of Loops in Urban Scenarios

    In this paper, the authors propose GeoCross, a simple, yet novel, event-driven geographic routing protocol that removes cross-links dynamically to avoid routing loops in urban Vehicular Ad Hoc Networks (VANETs). GeoCross exploits the natural planar feature of urban maps without resorting to cumbersome planarization. Its feature of dynamic loop detection...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Reputation-Based Dependable Scheduling of Workflow Applications in Peer-to-Peer Grids

    Grids facilitate creation of wide-area collaborative environment for sharing computing or storage resources and various applications. Inter-connecting distributed Grid sites through peer-to-peer routing and information dissemination structure (also known as peer-to-peer Grids) is essential to avoid the problems of scheduling efficiency bottleneck and single point of failure in the centralized...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Cloud Computing for Education: A New Dawn?

    Educational establishments continue to seek opportunities to rationalize the way they manage their resources. The economic crisis that befell the world following the near collapse of the global financial system and the subsequent bailouts of local banks with billions of tax payers' money will continue to affect educational establishments that...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    VPAL: Video Packet Adaptation Layer for Reliable Video Multicast Over IEEE 802.11n WLAN

    In this paper, the authors propose a scheme, called Video Packet Adaptation Layer (VPAL), for reliable video multicast over the IEEE 802.11n WLAN. VPAL is composed of raptor coding for reliable video transmission, header compression and packet aggregation, both for efficient video transmission. Most of the VPAL functionalities reside above...

    Provided By Reed Elsevier

  • White Papers // Mar 2011

    Adaptive Sleep Mode Management in IEEE 802.16m Wireless Metropolitan Area Networks

    The emerging IEEE 802.16m standard provides a new sleep mode operation for Mobile Stations (MSs). It evolves from the sleep mode operation in the IEEE 802.16 standard but with more advanced features, e.g., the listening window may be extended and the sleep cycle length is adjustable. To fully exploit these...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    A Performance Analysis of Block ACK Scheme for IEEE 802.11e Networks

    The demand for the IEEE 802.11 Wireless Local-Area Networks (WLANs) has been drastically increasing along with many emerging applications and services over WLAN. However, the IEEE 802.11 Medium Access Control (MAC) is known to be limited in terms of its throughput performance due to the high MAC overhead, such as...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    Energy-Aware WLAN Scanning in Integrated IEEE 802.16e/802.11 Networks

    The authors consider an issue arising in a Vertical HandOff (VHO) between IEEE 802.16e and IEEE 802.11 networks, i.e., how efficiently the scanning operation can be controlled to find a target Wireless Local Area Network (WLAN) Access Point (AP). For this purpose, they propose that the 802.16e Base Stations (BSs)...

    Provided By Reed Elsevier

  • White Papers // Jun 2011

    Fault-Tolerant Monitor Placement for Out-of-Band Wireless Sensor Network Monitoring

    Monitoring a sensor network to quickly detect faults is important for maintaining the health of the network. Out-of-band monitoring, i.e., deploying dedicated monitors and transmitting monitoring traffic using a separate channel, does not require instrumenting sensor nodes, and hence is flexible (can be added on top of any application) and...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    Multi-Dimensional Evidence-Based Trust Management With Multi-Trusted Paths

    Trust management is an extensively investigated topic. A lot of trust models and systems have been proposed in the literature. However, a universally agreed trust model is rarely seen due to the fact that trust is essentially subjective and different people may have different views on it. The authors focus...

    Provided By Reed Elsevier

  • White Papers // Apr 2011

    Capability Information: A Cost-Effective Information Model for Multi-Hop Routing of Wireless Ad Hoc Networks in the Real Environment

    In greedy routing, each relay node forwards the message to a neighbor (also called the successor) that is closer to the destination. However, the Successor Candidate Set (SCS) is different every time the relative location of the relay node to the destination changes. The configuration in the entire network, when...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    On the Capacity of Multi-Packet Reception Enabled Multi-Channel Multi-Interface Wireless Networks

    Multi-Packet Reception (MPR) offers increased number of concurrent transmissions, which improves the capacity of wireless Ad hoc networks. By equipping each node with multiple wireless interfaces, the transmissions can be separated into different channels and the throughput can be increased. Combining these two technologies, this paper studies the capacity of...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    Clustering-Based Location in Wireless Networks

    In this paper, the authors propose a three-phase methodology (measurement, calibration and estimation) for locating Mobile Stations (MS) in an indoor environment using wireless technology. Their solution is a fingerprint-based positioning system that overcomes the problem of the relative effect of doors and walls on signal strength and is independent...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Towards an Architecture for Semiautonomous Robot Telecontrol Systems

    The design and development of a computational system to support robot - operator collaboration is a challenging task, not only because of the overall system complexity, but furthermore because of the involvement of different technical and scientific disciplines, namely, Software Engineering, Psychology and Artificial Intelligence, among others. In the authors...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    New Receipt-Free Voting Scheme Using Double-Trapdoor Commitment

    It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme for large scale elections. However, in the following paper, proved that the scheme was...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Defending RFID Authentication Protocols Against DoS Attacks

    In this paper, the authors present a security weakness of a forward secure authentication protocol proposed by Tri Van Le et al. called O-FRAP which stands for Optimistic Forward secure RFID Authentication Protocol. In particular, the authors point out that in the O-FRAP protocol, the server can be subject to...

    Provided By Reed Elsevier

  • White Papers // Jan 2010

    Hidden Attribute-Based Signatures Without Anonymity Revocation

    The authors propose a new notion called hidden attribute-based signature, which is inspired by the recent developments in attribute-based cryptosystem. With this technique, users are able to sign messages with any subset of their attributes issued from an attribute center. In this notion, a signature attests not to the identity...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    Enhancements of Authenticated Multiple Key Exchange Protocol Based on Bilinear Pairings

    The author proposes two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, the authors show an impersonation attack on their pairing-based authenticated key exchange protocol. They demonstrate that any attacker can impersonate an entity to share multiple session keys with...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    Optimized Link State Routing for Mobile Ad Hoc Networks

    Multipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to applications. The authors' protocol, called MultiPath OLSR (MP-OLSR), is a multipath routing protocol based on OLSR. The Multipath Dijkstra Algorithm is...

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    Timing Aware Information Flow Security for a JavaCard-Like Bytecode

    Common protection mechanisms fail to provide end-to-end security; programs with legitimate access to secret information are not prevented from leaking this to the world. Information-flow aware analyses track the flow of information through the program to prevent such leakages, but often ignore information flows through covert channels even though they...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Distributed Push-Pull Estimation for Node Localization in Wireless Sensor Networks

    A great deal of research achievements on localization in Wireless Sensor Networks (WSNs) has been obtained in recent years. Nevertheless, its interesting challenges in terms of cost-reduction, accuracy improvement, scalability, and distributed ability design have led to the development of a new algorithm, the Push-Pull Estimation (PPE). In this algorithm,...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    On the Source Switching Problem of Peer-to-Peer Streaming

    Peer-To-Peer (P2P) streaming has been proved a popular and efficient paradigm of Internet media streaming. In some applications, such as an Internet video distance education system, there are multiple media sources which work alternately. A fundamental problem in designing such kind of P2P streaming system is how to achieve fast...

    Provided By Reed Elsevier

  • White Papers // Jun 2011

    Low Energy Operation in WSNs: A Survey of Preamble Sampling MAC Protocols

    The limited energy resources of sensor nodes are among the most important constraints in Wireless Sensor Networks (WSNs). Consequently, the Medium Access Control (MAC) layer design is crucial, due to its influence on the transceiver, which is the most energy-consuming component of a sensor node. Among the different MAC protocols...

    Provided By Reed Elsevier

  • White Papers // Apr 2011

    Quantitative Analysis of the Hidden Terminal Problem in Preamble Sampling WSNs

    Collisions in preamble sampling WSNs cause a high waste of resources due to the mandatory transmission of a long preamble before every message. Moreover, when hidden terminals are present, collisions are even more noticeable since the vulnerability time is proportional to the long preamble duration. This effect reduces considerably the...

    Provided By Reed Elsevier

  • Webcasts // Jun 2009

    Extend Your IT Security to Deal With the Social Generation and the New Internet

    The attendee of this webcast will explain the benefits and the security threats that the social generation internet poses the organisation. The presenter will show the popular methods used to infect, steal and use personal data using the new internet applications, the impacts to both the user, the services themselves...

    Provided By Reed Elsevier

  • Webcasts // Mar 2009

    Engendering Effective Web Security on a Tight Budget (or How to Have Your Security Cake and Eat It)

    The Internet has changed beyond anything could have foreseen just five years ago. It is no longer a browsing medium: it is full of Web 2.0 applications, real time communications challenges and a whole range of threats that are designed to piggy back on this new usage. The presenters of...

    Provided By Reed Elsevier

  • Webcasts // Aug 2009

    Implementing Effective End-Point Security and Data Encryption in the Modern IT Environment

    The IT security world has changed. Web 2.0, hybrid malware and advanced hacking techniques are now part of the threat landscape. Add in the fact that organised criminal gangs are now operating relatively freely on the Internet and in the real world, and it's no small wonder that the average...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    A Survey of MAC Based QoS Implementations for WiMAX Networks

    This paper presents a comprehensive survey of proposed Quality of Service (QoS) mechanisms in the Media Access Control (MAC) sublayer of WiMAX based wireless networks. QoS support in WiMAX is a fundamental design requirement, and is considerably more difficult than in wired networks, mainly because of the variable and unpredictable...

    Provided By Reed Elsevier

  • Webcasts // Dec 2009

    Securing Your Data Against the Latest Multi-Vectored Security Threats

    Data leaks, losses and thefts are now firmly on the boardroom agenda Why? Because organizations are being embarrassed, sued and even put out of business because of this serious security issue. This webcast can help the organization from becoming another victim. Research shows that 62% of fraud is committed by...

    Provided By Reed Elsevier

  • Webcasts // Nov 2009

    Cloud Security - New Threats on the Horizon

    Cloud computing means a range of different things to different people, but one thing that people are agreed on, and that is the need for cloud security. This webcast will explain why most organisations need to re-engineer their existing IT security infrastructure before adding the benefits of cloud computing to...

    Provided By Reed Elsevier

  • Webcasts // Oct 2009

    The Security Implications of Web 2.0

    There can be no doubt - the collaborative benefits of Web 2.0technologies have fueled rapid growth in online consumer markets and now are being adopted by businesses worldwide. But, just as Web 2.0 brings new and significant advantages to the business table, so there are new and highly threatening security...

    Provided By Reed Elsevier

  • Webcasts // Oct 2009

    Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

    o Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry's Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges...

    Provided By Reed Elsevier

  • Webcasts // Sep 2009

    Protecting Your Critical Data on a Budget

    The threats that organisation now faces have grown significantly more dangerous in recent times. At the same time, the mobility of the workforce - complete with their laptops, netbooks, handhelds and smartphones - has soared. It's against this backdrop that now there is need to defend against a rising level...

    Provided By Reed Elsevier

  • Webcasts // Jun 2009

    Addressing the Unique IT Security Risks Posed by the Virtual Data Center

    According to a recent report, 93 per cent of organizations are deploying server virtualization, and companies typically have virtualized 40 per cent of their application workload. This growing ubiquity and the ability for business-critical guest systems to proliferate and seamlessly move - as well as migrate - across a data...

    Provided By Reed Elsevier

  • Webcasts // Jun 2009

    What Security Professionals Can Learn From Real-World Network Data

    The presenter of this webcast will share key findings, analysis, and recommendations from their just released Application Usage and Risk Report, which is based on the actual network traffic in more than 60 large enterprises representing nearly a million users. Using real-world data provides network managers and CISOs a more...

    Provided By Reed Elsevier

  • White Papers // Mar 2009

    Robustness of Multimodal Biometric Fusion Methods Against Spoof Attacks

    This paper addresses the security of multimodal biometric systems when one of the modes is successfully spooled. It proposes two novel fusion schemes that can increase the security of multimodal biometric systems. The first is an extension of the likelihood ratio based fusion scheme and the other uses fuzzy logic...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    Knowledge-Assisted Visualization of Seismic Data

    This paper presents novel techniques for knowledge-assisted annotation and computer-assisted interpretation of seism data for oil and gas exploration. The paper describe the existing procedure for oil and gas search which consist of manually extracting information from seismic data and then aggregating it into knowledge in a detail-oriented bottom-up approach....

    Provided By Reed Elsevier

  • White Papers // Mar 2009

    MetaCDN: Harnessing 'Storage Clouds' for High Performance Content Delivery

    Content Delivery Networks (CDNs) such as Akamai and Mirror Image place web server cluster in numerous geographical locations to improve the responsiveness and locality of the content it hosts for end-users. However, their services are priced out of reach for all but the largest enterprise customers. An alternative approach to...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Windows Operating Systems Agnostic Memory Analysis

    Memory analysis is an integral part of any computer forensic investigation, providing access to volatile data not found on a drive image. While memory analysis has recently made significant progress, it is still hampered by hard-coded tools that cannot generalize beyond the specific operating system and version they were developed...

    Provided By Reed Elsevier